A method for prioritizing bus errors for a computing system is provided. A subsystem test is executed on a first subsystem from a plurality of subsystems on a bus system, wherein the subsystem test on the bus system is specific to the first bus subsystem. An output is received in response to executing the subsystem test. In response to the output indicating an error on the first subsystem, a severity level is assessed based on the error. For all subsystems from the plurality of subsystems on the bus system, a subsystem test is executed on each remaining subsystem, wherein each subsystem test on the bus system is specific to each remaining subsystem. An output is received in response to executing each subsystem test. In response to the output indicating an error on any of the remaining subsystems, a severity level is assessed based on the error.
|
1. A method for prioritizing bus errors in a data processing system, the method comprising the steps of:
(a) executing a subsystem test on a first subsystem from a plurality of subsystems on a bus system, wherein the subsystem test on the bus system is specific to the first subsystem; (b) receiving an output in response to executing the subsystem test; (c) in response to the output indicating an error on the first subsystem, assessing a severity level based on the error; wherein the error comprises at least one of an error type and an operation type; and wherein the operation type is one of address, data_read, data_write and unknown.
37. A system for prioritizing bus errors in a data processing system, comprising:
(a) executing means for executing a subsystem test on a first subsystem from a plurality of subsystems on a bus system, wherein the subsystem test on the bus system is specific to the first subsystem; (b) receiving means for receiving an output in response to executing the subsystem test; (c) assessing means for, in response to the output indicating an error on the first subsystem, assessing a severity level based on the error; wherein the error comprises at least one of an error type and operation type; and wherein the operation type is one of address, data read, data write and unknown.
17. A method for prioritizing bus errors in a data processing system, the method comprising the steps of:
(a) executing a subsystem test on a first subsystem from a plurality of subsystems on a bus system, wherein the subsystem test on the bus system is specific to the first subsystem; (b) receiving an output in response to executing the subsystem test; (c) in response to the output indicating an error on the first subsystem, assessing a severity level based on the error; wherein a severity level comprises at least one of an error type value and operation type value; and wherein the severity level is expressed as a predetermined factor times the error type value plus the operation type value.
19. A computer program product, in a computer-readable medium, for prioritizing bus errors in a data processing system, comprising:
a) instructions for executing a subsystem test on a first subsystem from a plurality of subsystems on a bus system, wherein the subsystem test on the bus system is specific to the first subsystem; (b) instructions for receiving an output in response to executing the subsystem test; (c) instructions for, in response to the output indicating an error on the first subsystem, assessing a severity level based on the error; wherein the error comprises at least one of an error type and an operation type; and wherein the operation type is one of address, data read, data write and unknown.
2. The method as recited in
(d) repeating steps (a)-(c) for all subsystems from the plurality of subsystems on the bus system.
3. The method as recited in
(e) compiling a list of a plurality of severity levels, wherein a security level within the list of the plurality of security levels is associated with a subsystem indicating an error; (f) comparing the plurality of severity levels within the list to one another; and (g) prioritizing the severity levels based on the comparison.
4. The method as recited in
(h) associating a symbol with at least one severity level; and (i) displaying the symbol and the at least one severity level.
5. The method as recited in
6. The method as recited in
7. The method as recited in
8. The method as recited in
9. The method as recited in
10. The method as recited in
11. The method as recited in
13. The method as recited in
14. The method as recited in
15. The method as recited in
16. The method as recited in
20. The computer program product as recited in
(d) instructions for repeating steps (a)-(c) for all subsystems from the plurality of subsystems on the bus system.
21. The computer program product as recited in
(e) instructions for compiling a list of a plurality of severity levels, wherein a security level within the list of the plurality of security levels is associated with a subsystem indicating an error; (f) instructions for comparing the plurality of severity levels within the list to one another; and (g) instructions for prioritizing the severity levels based on the comparison.
22. The computer program product as recited in
(h) instructions for associating a symbol with at least one severity level; and (i) instructions for displaying the symbol and the at least one severity level.
23. The computer program product as recited in
24. The computer program product as recited in
25. The computer program product as recited in
26. The computer program product as recited in
27. The computer program product as recited in
29. The computer program product as recited in
30. The computer program product as recited in
31. The computer program product as recited in
32. The computer program product as recited in
33. The computer program product as recited in
34. The computer program product as recited in
35. The computer program product as recited in
36. The computer program product as recited in
38. The system as recited in
(d) repeating means for repeating steps (a)-(c) for all subsystems from the plurality of subsystems on the bus system.
39. The system as recited in
(e) compiling means for compiling a list of a plurality of severity levels, wherein a security level within the list of the plurality of security levels is associated with a subsystem indicating an error; (f) comparing means for comparing the plurality of severity levels within the list to one another; and (g) prioritizing means for prioritizing the severity levels based on the comparison.
40. The system as recited in
(h) associating means for associating a symbol with at least one severity level; and (i) displaying means for displaying the symbol and the at least one severity level.
|
1. Technical Field
The present invention relates generally to the field of computer architecture and, more specifically, to methods and systems for managing machine check interrupts during runtime.
2. Description of Related Art
As computers become more sophisticated, diagnostic and repair processes have become more complicated and require more time to complete. A service technician may "chase" errors through lengthy diagnostic procedures in an attempt to locate one or more components that may be causing the errors within the computer. Diagnostic procedures generally specify several possible solutions to an error or problem in order to guide a technician to a determination and subsequent resolution of the problem. However, diagnostic procedures generally point to a component that is a likely candidate for the error, and if the component is determined to be reliable, the problem may remain unresolved until the next error occurs. In addition to paying for new components, a business must also pay for the recurring labor costs of the service technician and lost productivity of the user of the error-prone computer.
Most computing systems use some sort of surveillance to help detect system problems during operation of the computing system. Surveillance is a communication system between the operating system, e.g. Advanced Interactive executive (AIX), and a support system, e.g. a service processor. With typical surveillance, both the operating system and the support system send "heartbeat" messages to each other on a periodic basis. If either does not receive the heartbeat message from the other within a given period of time, it assumes that the other component has failed. As a result, the failure will be logged in a corresponding error log indicating that a repair action is necessary. However, in some instances reporting a first error found in the machine check is not necessarily the actual cause of the machine check.
Therefore, a method and system to prioritize multiple errors reported from a PCI bus and order the errors in a systematic list would be desirable.
The present invention provides a method for prioritizing bus errors for a computing system. A subsystem test is executed on a first subsystem from a plurality of subsystems on a bus system, wherein the subsystem test on the bus system is specific to the first bus subsystem. An output is received in response to executing the subsystem test. In response to the output indicating an error on the first subsystem, a severity level is assessed based on the error. For all subsystems from the plurality of subsystems on the bus system, a subsystem test is executed on each remaining subsystem, wherein each subsystem test on the bus system is specific to each remaining subsystem. An output is received in response to executing each subsystem test. In response to the output indicating an error on any of the remaining subsystems, a severity level is assessed based on the error.
The novel features believed characteristic of the invention are set forth in the appended claims. The invention itself, however, as well as a preferred mode of use, further objectives and advantages thereof, will best be understood by reference to the following detailed description of an illustrative embodiment when read in conjunction with the accompanying drawings, wherein:
With reference now to the figures, and in particular with reference to
Networked data processing system 100 is a network of computers in which the present invention may be implemented. Networked data processing system 100 contains a network 102, which is the medium used to provide communications links between various devices and computers connected together within networked data processing system 100. Network 102 may include wireline connections, such as copper wire or fiber optic cables, and wireless connections, such as cellular telephone connections. Also, the connections for network 102 may be either permanent, such as with a dedicated line, and/or temporary, such as connections made through dial up telephone connections.
In the depicted example, a server 104 is connected to network 102 along with storage unit 106. In addition, clients 108, 110, and 112 also are connected to network 102. These clients 108, 110, and 112 may be, for example, personal computers or network computers. For purposes of this application, a network computer is any computer, coupled to a network, which receives a program or other application from another computer coupled to the network. In the depicted example, server 104 provides data, such as boot files, operating system images, and applications to clients 108-112. Clients 108, 110, and 112 are clients to server 104. In a multi-tier networked environment, networked applications are provided in which a portion of the application is located on a server, such as server 104 and another portion of the application is located on a client, such as client 108. In this implementation, the client is considered a first tier system while the server is considered a second tier system.
Networked data processing system 100 may include additional servers, clients, and other devices not shown. In the depicted example, networked data processing system 100 is the Internet with network 102 representing a worldwide collection of networks and gateways that use the TCP/IP suite of protocols to communicate with one another. At the heart of the Internet is a backbone of high-speed data communication lines between major nodes or host computers, consisting of thousands of commercial, government, educational, and other computer systems, that route data and messages. Of course, networked data processing system 100 also may be implemented as an number of different types of networks, such as, for example, an intranet or a local area network.
Data processing system 200 is a logically partitioned data processing system. Thus, data processing system 200 may have multiple heterogeneous operating systems (or multiple instances of a single operating system) running simultaneously. Each of theses multiple operating systems may have any number of software programs executing within in it. Data processing system 200 is logically partitioned such that different I/O adapters 220-221, 228-129, 236-237, and 246-247 may be assigned to different logical partitions.
Thus, for example, suppose data processing system 200 is divided into three logical partitions, P1, P2, and P3. Each of I/O adapters 220-221, 228-229, and 236-237, each of processors 201-204, and each of local memories 260-264 is assigned to one of the three partitions. For example, processor 201, memory 260, and I/O adapters 220, 228, and 229 may be assigned to logical partition P1; processors 202-203, memory 261, and I/O adapters 221 and 237 may be assigned to partition P2; and processor 204, memories 262-263, and I/O adapters 236 and 246-247 may be assigned to logical partition P3.
Each operating system executing within data processing system 200 is assigned to a different logical partition. Thus, each operating system executing within data processing system 200 may access only those I/O units that are within its logical partition. Thus, for example, one instance of the Advanced Interactive Executive (AIX) operating system may be executing within partition P1, a second instance (image) of the AIX operating system may be executing within partition P2, and a Windows 2000™ operating system may be operating within logical partition P1. Windows 2000 is a product and trademark of Microsoft Corporation of Redmond, Wash.
Peripheral component interconnect (PCI) Host bridge 214 connected to I/O bus 212 provides an interface to primary PCI local bus 215. A number of Input/Output adapters 220-221 may be connected to primary PCI bus 215 via respective secondary PCI buses 218-219 and external address strobe (EADS) 216. Typical PCI bus implementations will support between four and eight I/O adapters (i.e. expansion slots for add-in connectors). Each I/O Adapter 220-221 provides an interface between data processing system 200 and input/output devices such as, for example, other network computers, which are clients to data processing system 200. EADS 216, 224, 232, and 242 are multifunction PCI-PCI bridges that support hot plugging of I/O adapters on the secondary buses 218-219, 226-227, 234-235, and 244-245. Hot plugging allows the addition, removal, and replacement of I/O adapters 220-221, 228-229, 236-237, and 248-249 during runtime. Each adapter 220-221, 228-229, 236-237, and 248-249 has its own secondary PCI bus 218-219, 226-227, 234-235, and 244-245, which makes hot plugging possible. Each EADS 216, 224, 232, and 242 may be configured to function as a bridge from a primary bus 215, 223, 231, and 241 to up to eight secondary hot plug PCI busses 218-219, 226-227, 234-235, and 244-245. In the depicted embodiment primary PCI buses 215, 223, 231, and 241 are 64-bits wide, 3.3 volt (V) tolerant and run at between 16-66 MHz. Secondary PCI buses 218-219, 226-227, 234-235, and 244-245 are 32-bits wide, wherein each pair of secondary PCI buses 218-219, 226-227, 234-235, and 244-245 may be combined into a 64-bit wide bus.
Additional PCI host bridges 222 and 230 provide interfaces for additional primary PCI buses 223 and 231. Each of additional primary PCI buses 223 and 231 are connected to a respective one of EADS 224 and 232. Each of EADS 224 and 232 is connected to a plurality of secondary PCI buses 226-227 and 234-235 as depicted in FIG. 2. Secondary PCI buses 226-227 and 234-235 provide a connection between a plurality of PCI I/O adapters 228-229 and 236-237 to EADS 224 and 232. Thus, additional I/O devices, such as, for example, modems or network adapters may be supported through each of PCI I/O adapters 228-229 and 236-237. In this manner, data processing system 200 allows connections to multiple network computers.
A memory mapped graphics adapter 248 and hard disk 250 may also be connected to I/O bus 212 via EADS 242 and PCI Host Bridge 240. EADS 242 is connected to PCI Host Bridge 240 through primary PCI bus 241. Graphics adapter 248 is connected to EADS 242 through secondary PCI bus 244 and hard disk adapter 249, through which hard disk 250 is connected to data processing system 200, is connected to EADS 242 through secondary PCI bus 245. Hard disk 250 may be logically partitioned between various partitions without the need for additional hard disks. However, additional hard disks may be utilized if desired.
Those of ordinary skill in the art will appreciate that the hardware depicted in
An operating system runs on processor 302 and is used to coordinate and provide control of various components within data processing system 300 in FIG. 3. The operating system may be a commercially available operating system such as Windows 2000, which is available from Microsoft Corporation. "Windows 2000" is a trademark of Microsoft Corporation. An object oriented programming system such as Java may run in conjunction with the operating system and provides calls to the operating system from Java programs or applications executing on data processing system 300. Instructions for the operating system, the object-oriented operating system, and applications or programs are located on storage devices, such as hard disk drive 326 and may be loaded into main memory 304 for execution by processor 302.
Those of ordinary skill in the art will appreciate that the hardware in
The present invention provides a method to prioritize multiple errors reported from a PCI bus and order the errors in a systematic list. When a system makes a machine check, an operating system calls a routine to isolate an error that caused an exception. The error is reported back to the operating system in an error log. A routine searches for errors stored in registers and analyzes the errors as they are discovered. A severity factor is assigned to the error type and operation. The sum of the error type and operation severity factors determines the error severity level. Each error is then listed in a prioritized list. When the machine check is completed, the prioritized list is returned to the operating system.
When a machine check is received, a check-exception code searches through the PCI bus reading error registers along the way. When the check-exception code finds an error, the check-exception code analyzes the error. An error "type" and error "operation" are calculated. The error type and the error operation may range from a high value to a low value. The error type and error operation may be both assigned a number, for example, between 0 and 4. The error type number and the error operation number may be combined in a number of ways, for example, by adding a multiplier to at least one of the error type number and the error operation number and summing the two values. The combination of the error type number and the error operation number creates the error severity level.
A first detected error is recorded as the worst error. The check-exception code continues to scan the PCI bus for more errors. If a second error is detected, then the second error is analyzed for its severity similar to the first detected error. If the second error has a higher error severity level than the first detected error, the second detected error replaces the first detected error as the worst error and the first detected error is moved down a error severity list. If the second detected error severity level is less than the first detected error severity level, the second detected level is listed below the first detected error. The PCI bus continues to be analyzed until all items on the PCI bus have been checked for errors. Once all items on the PCI bus have been checked, the check-exception code sends an error log that may contain a listing of all the errors and associated error severity levels. The errors and associated error severity levels are prioritized according to each error's severity level.
An operating system (OS) 402 executing within a data processing system, such as, for example, data processing system 200 in
The machine check interrupt indicates that one of I/O adapters 414-420, connected to PCI Host Bridges 210-212 is bad (i.e. has ceased to perform correctly). OS handler 404 makes calls to RTAS 408 to determine whether a machine check has occurred and RTAS 208 presents the machine check interrupt data to OS handler 204 in the form of an error log entry. An example of an error log entry is:
Such an error log entry indicates to OS 402 that machine check interrupt has been received indicating that an I/O adapter 422-428 identified by, for example, the ID "BFE4C025" has failed. OS handler 404 than posts data to error log 406 based on the information received from RTAS 408. Error log 500 in
The contents of error log 406 indicates which of I/O adapters 414-420 is bad, if RTAS 408 is able to determine such information. Otherwise, the entry in error log 406 merely reflects the fact that a machine check interrupt has occurred within the data processing system without indicating which of I/O Adapters 414-420 caused the machine check interrupt.
Once OS handler 404 has written to error log 406, OS 402 analyzes error log 406 to determine the identity of the failing I/O adapter 422-428. For example, an AIX operating system may analyze error log 406 using the "DIAG" command and produce the following result:
A03-030: I/O bus time-out, access, or other error | |||
n/a | FRU:n/a | U0.1-P1-I3 | |
The data structure of the form "U0.X" indicates by "X" the drawer number of the bad adapter. Thus, in the example of above, "U0.1" (X=1), indicates that the drawer number of the bad adapter is "1." The data structure of the form "IY" indicates the slot number of the bad adapter where "Y" is the slot number. Thus, in the example above, the bad adapter is in slot 3, drawer 1.
If OS interrupt handler 404 is unable to determine the one of I/O adapters 414-420 that failed, then the data processing system is powered off. If, however, OS interrupt handler 404 is able to determine the one of I/O adapters 413-420 that failed, then operating system 202 will call RTAS 408 hot plug to disable the failing I/O adapter 414-420 and deallocate any processes bound to the failing one of I/O adapters 414-420.
Once the failing one of I/O adapters 414-420 is disabled, an urgent sysplanar message can be sent to a user notifying the user of the bad adapter, such as, for example, via a page, a message to a video display terminal, and/or blinking lights on the slot containing the bad adapter. An urgent sysplanar is a message that the system will output to an output device, typically at predefined time intervals, so that a user may be alerted the adapter is no longer working.
The user will then be able to replace the bad adapter, re-enable the adapter, using the hotplug feature provided by OS 402, RTAS 408, and EADS 414 and 418 working in concert. The user may then reconfigure the adapter once replaced.
Those of ordinary skill in the art will appreciate that the hardware and software depicted in
Returning to step 614, if the PCI bus device is reporting an error (step 614:YES), the PCI bus device reporting the error is analyzed (step 618). The current severity of the PCI bus device error is then calculated (step 620). The current severity of the PCI bus device error may be expressed as:
where rc.type is an error type and rc.op is an operation type.
Then a determination is made as to whether or not the current severity of the PCI bus error is greater than the worst severity PCI bus error (step 622). The worst severity of the PCI bus error may have been established from prior PCI bus device analyses. If the current severity of the PCI bus device error is not greater than the worst severity of the PCI bus device error (step 622:NO), the current severity of the PCI bus device error and associated PCI bus device is recorded and saved in an error possibility list (step 630) and thereafter the operation terminates. If the current severity of the PCI bus device error is greater than the worst severity of the PCI bus device error (step 622:YES), then the worst PCI bus device equals the current PCI bus device (step 624). The worst severity of the PCI bus device error equals the current severity of the PCI bus device error (step 626). The worst severity of the PCI bus device and the associated PCI bus device is then recorded and saved in the error possibility list (step 628) and thereafter the operation terminates.
Returning to step 808, if the DERR is set (step 808:YES), the PCI bus device "status" register is read (step 846). Then a determination is made as to whether or not the PCI bus device is a PCI bus bridge (step 848). If the PCI bus device is not a PCI bus bridge (step 848:NO), then a determination is made as to whether or not the PERR is set (step 850). If the PERR is set (step 850:YES), the error type is indicated as "parity" and the operation type is indicated as "read" (step 852) and thereafter the operation terminates. If the PERR is not set (step 850:NO), the error type is indicated as "parity" and the operation type is indicated as "write" (step 854) and thereafter the operation terminates.
Returning to step 848, if the PCI bus device is a PCI bus bridge (step 848:YES), the PCI bus device "secondary status` register is read (step 856). Then a determination is made as to whether or not the DERR is set (step 858). If the DERR is set (step 858:YES), the PCI bus device "status" register is read (step 862) and thereafter the operation returns to step 850 in which a determination is made as to whether or not the PERR is set. If the DERR is not set (step 858:NO), the PCI bus device "secondary status" register is read (step 860) and thereafter the operation returns to step 850 in which a determination is made as to whether or not the PERR is set.
Returning to step 806, if the SERR is set (step 806:YES), the PCI bus device "status" register is read (step 816). Then a determination is made as to whether or not the PCI bus device is a PCI bus bridge (step 818). If the PCI bus device is not a PCI bus bridge (step 818:NO), then a determination is made as to whether or not the PERR is set (step 834). If the PERR is not set (step 834:NO), the error type is indicated as "internal" and the operation type is indicated as "none" (step 838) and thereafter the operation terminates. If the PERR is set (step 834:YES), the error type is indicated as "parity" and the operation type is indicated as "address (step 836) and thereafter the operation terminates.
Returning to step 818, if the PCI bus device is a PCI bus bridge (step 818:YES), then the PCI bus device "secondary status" register is read (step 820). Then a determination is made as to whether or not the SERR is set (step 822). If the SERR is not set (step 822:NO), the PCI bus device "secondary status" register is read (step 840). Then a determination is made as to whether or not the DERR set in the PCI bus device "status" register is parallel to the PCI bus device "secondary status" register (step 842). If the DERR set in the PCI bus device "status" register is parallel to the PCI bus device "secondary status" register (step 842:NO), the operation continues to step 856 in which the PCI bus device "secondary status" register is read. If the DERR set in the PCI bus device "status" register is not parallel to the PCI bus device "secondary status" register (step 842:NO), a determination is made as to whether or not the PERR set in the PCI bus device "status" register is parallel to the PCI bus device "secondary status" register (step 844). If the PERR set in the PCI bus device "status" register is parallel to the PCI bus device "secondary status" register (step 844:YES), the error type is indicated as "parity" and the operation type is indicated as "unknown" (step 836) and thereafter the operation terminates. If the PERR set in the PCI bus device "status" register is not parallel to the "secondary status" register (step 844:NO), the error type is indicated as "internal" and the operation type is indicated as "none" (step 838) and thereafter the operation terminates.
Returning to step 822, if the SERR is set (step 822:YES), then a switch is made to a secondary bus (step 824). Then a next PCI bus device is located (step 826). Then a determination is made as to whether or not the PCI bus device exists (step 828). If the PCI bus device does not exists (step 828:NO), then the operation returns to step 810 in which a determination is made as to whether or not the PCI bus device is valid. If the PCI bus device does exist (step 828:YES), the PCI bus device "status" register is read (step 830). Then a determination is made as to whether or not the PCI bus device is reporting an error (step 832). If the PCI bus device is not reporting an error (step 832:NO), the operation returns to step 826 in which the next PCI bus device is located. If the PCI bus is reporting an error (step 832:YES), the operation returns to step 802 in which the PCI bus device is analyzed.
When each bus error value is determined, for example, type error value and operation error value, a severity level may be assessed. As illustrated by severity level calculation 906, the error type error value and the error operation error value may be combined. In one embodiment of the present invention, the severity level may be combined, for example, by utilizing the following equation:
For example, an internal error type such as, for example, a target_abort, may have a severity level of 20. An error type parity error and a operation address error combined, in a case, such as, for example, a parity-error may have a value of 44.
Therefore, the present invention provides for a method to prioritize multiple errors reported from a bus and order the errors in a systematic list. When a machine check is received an check-exception code searches through, for example, a PCI bus, reading error registers during the search. When an error is found the present invention analyses the error. Multiple errors may be detected, such as, for example, an error type and an error operation. The error may then be assigned a value based on the seriousness of the error. The error values may then be combined to calculate a error severity level.
With the processes of the present invention, a first error is recorded as the most severe error. The check-exception code continues to scan the bus for the presence of more errors. If another error is detected during the scanning process, then the additional error is analyzed. A severity level is calculated for the additional error and compared to the first error. If the additional error has a higher combined valued than the first error, the additional error is listed more prominently than the first error. However, if the first error value is remains as the highest detected error, the first error remains listed more prominently than the additional error. The analyzing of the bus continues until all items connected to the bus have been checked. Once all the items connected to the bus have been checked, the check-exception code sends an error log a listing of all the detected errors listed based on their corresponding severity levels. Thereby, with the use of the present invention, a system administrator or system technician is able to determine the cause of all faults on a bus as well as the faults which will have the highest probability of causing a catastrophic failure of the bus.
It is important to note that while the present invention has been described in the context of a fully functioning data processing system, those of ordinary skill in the art will appreciate that the processes of the present invention are capable of being distributed in the form of a computer readable medium of instructions and a variety of forms and that the present invention applies equally regardless of the particular type of signal bearing media actually used to carry out the distribution. Examples of computer readable media include recordable-type media such as a floppy disc, a hard disk drive, a RAM, and CD-ROMs and transmission-type media such as digital and analog communications links.
The description of the present invention has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the invention in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art. The embodiment was chosen and described in order to best explain the principles of the invention, the practical application, and to enable others of ordinary skill in the art to understand the invention for various embodiments with various modifications as are suited to the particular use contemplated.
Austen, Christopher Harry, Wenning, Mark Walz, Perez, Michael Anthony
Patent | Priority | Assignee | Title |
7260744, | Oct 21 2003 | SAP SE | Computer system diagnosis with user-developed procedure |
7260750, | Oct 22 2003 | SAP SE | Computer system diagnostic procedures performed in specified order |
7263634, | Oct 21 2003 | SAP SE | Failures of computer system diagnostic procedures addressed in specified order |
7464300, | Dec 14 2004 | Intel Corporation | Method, apparatus and system to detect and signal sequential hot plug failure diagnostics |
7853831, | Nov 12 2004 | NetApp, Inc | Methods and structure for detection and handling of catastrophic SCSI errors |
Patent | Priority | Assignee | Title |
5596716, | Mar 01 1995 | Unisys Corporation | Method and apparatus for indicating the severity of a fault within a computer system |
5666485, | Jun 07 1995 | SAMSUNG ELECTRONICS CO , LTD | Software driver for a system bus |
5701409, | Feb 22 1995 | PMC-SIERRA, INC | Error generation circuit for testing a digital bus |
5708775, | Apr 19 1995 | Fuji Xerox Co., Ltd. | Fault information notification system localized at each network server |
6012152, | Nov 27 1996 | TELEFONAKTIEBOLAGET LM ERICSSON PUBL | Software fault management system |
6430164, | Jun 17 1999 | Cellport Systems, Inc. | Communications involving disparate protocol network/bus and device subsystems |
6650949, | Dec 30 1999 | GE GLOBAL SOURCING LLC | Method and system for sorting incident log data from a plurality of machines |
20020124215, | |||
20020178404, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Mar 21 2001 | AUSTEN, CHRISTOPHER HARRY | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 011632 | /0392 | |
Mar 21 2001 | PEREZ, MICHAEL ANTHONY | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 011632 | /0392 | |
Mar 21 2001 | WENNING, MARK WALZ | International Business Machines Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 011632 | /0392 | |
Mar 22 2001 | International Business Machines Corporation | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Aug 11 2004 | ASPN: Payor Number Assigned. |
Jan 11 2008 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Aug 06 2012 | REM: Maintenance Fee Reminder Mailed. |
Oct 04 2012 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Oct 04 2012 | M1555: 7.5 yr surcharge - late pmt w/in 6 mo, Large Entity. |
Jul 29 2016 | REM: Maintenance Fee Reminder Mailed. |
Dec 21 2016 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Dec 21 2007 | 4 years fee payment window open |
Jun 21 2008 | 6 months grace period start (w surcharge) |
Dec 21 2008 | patent expiry (for year 4) |
Dec 21 2010 | 2 years to revive unintentionally abandoned end. (for year 4) |
Dec 21 2011 | 8 years fee payment window open |
Jun 21 2012 | 6 months grace period start (w surcharge) |
Dec 21 2012 | patent expiry (for year 8) |
Dec 21 2014 | 2 years to revive unintentionally abandoned end. (for year 8) |
Dec 21 2015 | 12 years fee payment window open |
Jun 21 2016 | 6 months grace period start (w surcharge) |
Dec 21 2016 | patent expiry (for year 12) |
Dec 21 2018 | 2 years to revive unintentionally abandoned end. (for year 12) |